Game Theory is an important part of the underlying strategy used by hackers when playing attack and defend Capture the Flag. It’s thinking how your opponent might respond to an event and then planning for it. Knowing when to patch and when not to was part of the winning strategy behind DARPA’s 2016 Cyber Grand Challenge, which was modeled off the DEF CON CTF.
But what happened the day after CGC at DEF CON 24? That was the day the very best human CTF hackers were invited to play against the winner of CGC, a computer reasoning system named Mayhem. This episode of The Hacker Mind starts to answer the question, can a machine really think like a hacker?
EP 45: Hacking Industrial Control Systems
EP 44: Hackers Wanted: Filling the Cybersecurity Skills Gap
EP 43: Follow The Rabbit
EP 42: Hacking Aerospace
EP 41: Hacking The Art of Invisibility
EP 40: Hacking Ethereum Smart Contracts
EP 39: Fuzzing Crypto
EP 38: Going Passwordless
EP 37: A Hacker From Hollywood
EP 36: Fuzzing Message Brokers
EP 35: Digital Forensics
EP 34: Hacking Behavioral Biometrics
EP 33: Scanning the Internet
EP 32: The Hunt For Ghost #1
EP 31: Stopping the Mirai IoT Botnet, One CnC Server At A Time
EP 30: Surviving Stalkerware
EP 29: Learn Competitive Hacking with picoCTF
EP 28: Fuzzing Hyper-V
EP 27: Car Hacking 0x05
EP 26: Hacking Charity
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast